GRC Maturity

v1.0.0

Conduct detailed assessments of an organization's Governance, Risk & Compliance maturity with reports, level frameworks, gaps, and recommendations.

0· 36·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, and provided OpenAPI endpoints (assess, maturity-levels, building-blocks) align with a GRC maturity assessment service. There are no unrelated environment variables, binaries, or install steps requested.
Instruction Scope
SKILL.md and openapi.json describe request/response formats but do not include a servers/base URL or any authentication mechanism; runtime callers will need an explicit API host and auth details before sending organizational data. Instructions do not request reading local files or unrelated environment variables.
Install Mechanism
No install spec or code is included (instruction-only), so nothing is written to disk or downloaded during install.
Credentials
The skill declares no required environment variables or credentials. That is proportionate for a read-only API specification. (Note: actual API usage will likely require an API key or account, but none is requested here.)
Persistence & Privilege
The skill does not request always:true and does not modify other skills or system configuration. It is a user-invocable instruction-only skill with normal autonomous invocation settings.
Assessment
This appears to be an instruction-only description of a GRC maturity API and is internally consistent. Before using it: verify the API host and authentication method (the OpenAPI lacks a servers/base URL and any auth scheme), confirm the operator (toolweb.in links) and their privacy/TOS, and avoid sending sensitive production data until you know the endpoint is legitimate and secured (TLS, API keys, and data retention policy). If you intend to integrate, request explicit host, auth, and data-handling details from the provider.

Like a lobster shell, security has layers — review code before you run it.

latestvk97ergtk3qrzevy0k6v495c7ch842ggx

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments